Static task
static1
Behavioral task
behavioral1
Sample
379bb739c7aa12fffd77f8794fb8d5f5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
379bb739c7aa12fffd77f8794fb8d5f5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
379bb739c7aa12fffd77f8794fb8d5f5_JaffaCakes118
-
Size
1.0MB
-
MD5
379bb739c7aa12fffd77f8794fb8d5f5
-
SHA1
4d8ea6504804c460f815ecf66f0d39a49290af10
-
SHA256
1247600e06d96a3992c778ffa2eac3a3e5af8c295789a846342c2713d99304e5
-
SHA512
fc56aa684533ca8c8f518237d59094ebbf1a5c7fb2e3bc065ea000e4f95b5062caae4d3f8c9a1e98a3ce7126258d34da5d8501e3fdb360a4dd5d2be6683a8ad0
-
SSDEEP
24576:BlCiJTYPynwNHwVjB3w8eJaHNlMLGaOrkxNumIe:eiJ86nw2V93wZJwM9Ork2mIe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 379bb739c7aa12fffd77f8794fb8d5f5_JaffaCakes118
Files
-
379bb739c7aa12fffd77f8794fb8d5f5_JaffaCakes118.exe windows:4 windows x86 arch:x86
249f88509b67433f5fe3e349d6f00ccf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetVersion
GetTickCount
msvcrt
__setusermatherr
exit
toupper
_XcptFilter
__p__commode
memmove
user32
DestroyWindow
BeginPaint
EndPaint
LoadIconA
DefWindowProcA
TranslateMessage
DispatchMessageA
MessageBoxA
ScreenToClient
SetWindowTextA
Sections
.text Size: 1024B - Virtual size: 961B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 1023B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 421B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1018KB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ